- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Good day all - trust you're doing well today!
Sorry for dummy question but, I'm planning to deploy a new VSX firewall in DC (in cluster mode, a pair of SG-2200) and, I stopped in a doubt about which is best to manage/configure interfaces on firewall: using dedicated interfaces with VLANS or using interfaces lead by virtual switch? which is best
SG2200 will be way too small to run VSX buddy
only 2 cores and not much memory. Stay away ![]()
Hi Kaspars; thanks for heads-up; we will deploy for a no large requirements for our customer.
My main concern is about which model of topology we can use/determine to maximize performance and reduce overrun/overload both VSX capacity. Not sure if I configure virtual-systems as a regular interface or uses interfaces based on virtual switch (leads by switch). Your advice will be welcome and helps very much.
Hmm, I'm still not 100% if you can even run VSX on those - have you done that already just the basic install?
Switch or not is a personal preference. I have seen both scenarios, even with virtual router. Really depends on your network topology and requirements. Think that virtual switch is another VS that you need to spin up that will chew your already tiny resources...
Well, I discussed here with network guru guys and their suggestion was to using regular interface instead. I review all interconnections needed and see that we will gain some control and reduce overrun on SG processor and memory usage. Our topology, I tried to keep simple and clean, but some application services need to specific control and network separation (layer 2 VLAN) and access controlled directly by firewall rules.
Anyway, many thanks for your input; appreciate.
The typical deployment, as I understand it, is to vswitch the internal interfaces and then trunk them to the internal core and leave the external interfaces as straight up LAN/VLAN. Are you talking about virtual switches inside, outside or both? A lot depends on your environment.
Bear in mind VSX is intended to provision multiple gateways leading to multiple internal networks. i.e. - to firewall each network with its own gateway/cluster. It's a "rack in a box" solution.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY